2018
DOI: 10.1007/s41650-018-0039-9
|View full text |Cite
|
Sign up to set email alerts
|

Coverage Optimization for UAV-Aided Internet of Things with Partial Channel Knowledge

Abstract: Please refer to published version for the most recent bibliographic citation information. If a published version is known of, the repository item page linked to above, will contain details on accessing it.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…The eavesdropper locates with a safety distance 100m away from the scheduled legitimate user to hide himself, and moves following the trajectory of the UAV swarm for better eavesdropping. Unless otherwise specified, the system parameters are set as follows: the number of antennas for the legitimate users N B = 4, the number of antennas for the eavesdropper N E = 2, the transmission duration τ = 4s, f = 2.4GHz [4], c = 3 × 10 8 m/s, a = 5.0188, b = 0.3511 [36] and the noise covariance δ 2 = −107dBm [41]. The threshold presented in Algorithm 1 is fixed as ǫ = 10 −3 .…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The eavesdropper locates with a safety distance 100m away from the scheduled legitimate user to hide himself, and moves following the trajectory of the UAV swarm for better eavesdropping. Unless otherwise specified, the system parameters are set as follows: the number of antennas for the legitimate users N B = 4, the number of antennas for the eavesdropper N E = 2, the transmission duration τ = 4s, f = 2.4GHz [4], c = 3 × 10 8 m/s, a = 5.0188, b = 0.3511 [36] and the noise covariance δ 2 = −107dBm [41]. The threshold presented in Algorithm 1 is fixed as ǫ = 10 −3 .…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…where [x] + = max(0, x). 4 Different from the existing literatures [37], [38], AN in this work is designed by using only the large-scale CSI instead of the instantaneous legitimate CSI.…”
Section: B Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…the authors from [24] defines a model for high-altitude fixed-wing UAV A2G channel communications between aerial base stations. Wang et al [25] suggests coverage optimization considering small-scale and large-scale fading channels. Pereira [26] analyzes packet combining techniques using SC-FDE in the terrestrial networks.…”
Section: A Related Workmentioning
confidence: 99%
“…Next, UAVs have fully controllable mobility in the three-dimensional (3D) space. Although this introduces new challenges in mobility management for wireless networks, such a feature can also be exploited with proper UAV positioning/trajectory design for performance optimization (see, e.g., [1,[8][9][10][11][12][13][14][15] and the references therein). Furthermore, security is another key issue faced in UAV-enabled wireless networks.…”
Section: Introductionmentioning
confidence: 99%